DS0012 Script
A file or stream containing a list of commands, allowing them to be launched in sequence312
Item | Value |
---|---|
ID | DS0012 |
Platforms | Windows |
Collection Layers | Host |
Version | 1.1 |
Created | 20 October 2021 |
Last Modified | 07 December 2022 |
Data Components
Script Execution
The execution of a text file that contains code via the interpreter (e.g. Powershell, WMI, Windows EID 4104, etc.)
References
-
Dunwoody, M. (2016, February 11). Greater Visibility Through PowerShell Logging. Retrieved September 28, 2021. ↩
-
Microsoft. (2019, April 19). Antimalware Scan Interface (AMSI). Retrieved September 28, 2021. ↩
-
Microsoft. (2020, March 30). about_Logging_Windows. Retrieved September 28, 2021. ↩
-
Adrien Bataille, Anders Vejlby, Jared Scott Wilson, and Nader Zaveri. (2021, December 14). Azure Run Command for Dummies. Retrieved March 13, 2023. ↩
-
Sayre, K., Ogden, H., Roberts, C. (2018, October 10). VBA Stomping — Advanced Maldoc Techniques. Retrieved September 17, 2020. ↩
-
Bontchev, V. (2019, July 30). pcodedmp.py - A VBA p-code disassembler. Retrieved September 17, 2020. ↩
-
decalage2. (2019, December 3). python-oletools. Retrieved September 18, 2020. ↩
-
MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021. ↩
-
The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021. ↩
-
Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. ↩
-
Nelson, M. (2017, January 5). Lateral Movement using the MMC20 Application COM Object. Retrieved November 21, 2017. ↩